Use correct digest length when checking a received key.
This commit is contained in:
parent
76b41ba20d
commit
113458c286
1 changed files with 1 additions and 1 deletions
|
@ -261,7 +261,7 @@ bool send_challenge(connection_t *c) {
|
|||
bool challenge_h(connection_t *c, char *request) {
|
||||
char buffer[MAX_STRING_SIZE];
|
||||
size_t len = rsa_size(&myself->connection->rsa);
|
||||
size_t digestlen = digest_length(&c->outdigest);
|
||||
size_t digestlen = digest_length(&c->indigest);
|
||||
char digest[digestlen];
|
||||
|
||||
if(sscanf(request, "%*d " MAX_STRING, buffer) != 1) {
|
||||
|
|
Loading…
Reference in a new issue